mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
227 lines
8.1 KiB
JSON
227 lines
8.1 KiB
JSON
{
|
|
"id": "CVE-2001-1244",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2001-07-07T04:00:00.000",
|
|
"lastModified": "2018-10-30T16:26:22.763",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 5.0
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D2019E0E-426B-43AF-8904-1B811AE171E8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3DB008E3-9A00-4D28-8826-A9FCC9F65314"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDD9BE2B-7255-4FC1-B452-E8370632B03F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:vvos:11.04:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1D462D6F-EB68-4E31-87FD-D918F5DEF3FB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C24A129D-2E5E-436C-95DE-AE75D2E8D092"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5F49A384-7222-41F3-9BE1-4E18C00E50A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "05520FE3-C48D-42E8-BC24-C2396BD46CBA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D865FBB6-E07D-492F-A75E-168B06C8ADEE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:workstation:*:*:*:*:*",
|
|
"matchCriteriaId": "FE4E91DD-FA6B-4735-A07C-0A88BADCAFCC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "294EBA01-147B-4DA0-937E-ACBB655EDE53"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4E8B7346-F2AA-434C-A048-7463EC1BB117"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E53CDA8E-50A8-4509-B070-CCA5604FFB21"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5BDCBCB8-DAA3-465F-ADDE-9143B8251989"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B86E0671-ED68-4549-B3AC-FD8BD79B0860"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BB76E7EC-C396-4537-9065-4E815DA7097C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4CD026E2-B073-40A6-AD4A-8C76B9169B01"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DBFB3E49-3FB5-4947-856D-727CBFFBA543"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B9236480-6450-42E1-B1FF-F336488A683A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "14F55877-A759-4C8A-84D5-70508E449799"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E10D9BF9-FCC7-4680-AD3A-95757FC005EA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78E8C3A4-9FA7-4F2A-8C65-D4404715E674"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "80EB24F0-46A7-481B-83ED-8BB012AE0C8E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AA6AEAF0-FA61-4A3F-A083-1218C2027781"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "08003947-A4F1-44AC-84C6-9F8D097EB759"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2475113-CFE4-41C8-A86F-F2DA6548D224"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/195457",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/2997",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6824",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |